Close Menu
    Main Menu
    • Home
    • News
    • Tech
    • Robotics
    • ML & Research
    • AI
    • Digital Transformation
    • AI Ethics & Regulation
    • Thought Leadership in AI

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Alert: Uncovered JDWP Interfaces Result in Crypto Mining, Hpingbot Targets SSH for DDoS

    July 6, 2025

    As we speak’s NYT Mini Crossword Solutions for July 6

    July 6, 2025

    A Mild Introduction to Principal Element Evaluation (PCA) in Python

    July 6, 2025
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Home»AI Ethics & Regulation»Apache APISIX Vulnerability Permits Cross-Issuer Entry Underneath Misconfigurations
    AI Ethics & Regulation

    Apache APISIX Vulnerability Permits Cross-Issuer Entry Underneath Misconfigurations

    Declan MurphyBy Declan MurphyJuly 6, 2025No Comments2 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Apache APISIX Vulnerability Permits Cross-Issuer Entry Underneath Misconfigurations
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    A newly disclosed vulnerability, CVE-2025-46647, has been recognized within the openid-connect plugin of Apache APISIX, a broadly used open-source API gateway.

    This flaw, rated as necessary, might enable attackers to realize unauthorized entry throughout totally different id issuers below particular misconfigurations.

    The vulnerability was reported by JunXu Chen to the Apache APISIX growth mailing listing on July 2, 2025, and credited to safety researcher Tiernan Messmer.

    CVE ID Product Affected Variations Mounted Model Severity
    CVE-2025-46647 Apache APISIX < 3.12.0 3.12.0 Necessary

    Technical Particulars

    The vulnerability arises from improper validation of the issuer when utilizing the openid-connect plugin in introspection mode.

    Particularly, the plugin fails to adequately confirm the issuer from the introspection discovery URL, which will be exploited in sure multi-issuer environments.

    This vulnerability solely impacts deployments that meet all of the next situations:

    • The openid-connect plugin is enabled and configured in introspection mode.
    • The authentication service related to the plugin helps a number of issuers.
    • These issuers share the identical personal key and rely solely on the issuer worth for differentiation.

    If these situations are met, an attacker with legitimate credentials for one issuer might doubtlessly use their token to entry assets protected by one other issuer, successfully bypassing cross-issuer boundaries.

    The flaw is especially regarding for organizations utilizing a single id supplier throughout a number of logical domains, corresponding to in multi-tenant enterprise environments or federated cloud architectures.

    In such instances, improper issuer validation might result in unauthorized entry to delicate assets, undermining the safety mannequin of the affected methods.

    Affected Variations

    Software program Affected Variations Mounted Model
    Apache APISIX < 3.12.0 3.12.0

    All customers working Apache APISIX variations prior to three.12.0 are strongly suggested to improve to model 3.12.0 or later.

    The Apache APISIX crew has addressed the problem on this launch, making certain correct validation of the issuer within the openid-connect plugin.

    Unique Webinar Alert: Harnessing Intel® Processor Improvements for Superior API Safety – Register for Free

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Declan Murphy
    • Website

    Related Posts

    Alert: Uncovered JDWP Interfaces Result in Crypto Mining, Hpingbot Targets SSH for DDoS

    July 6, 2025

    Kritische Schwachstelle in Cisco Unified CM entdeckt

    July 5, 2025

    How Digital Government Safety Shields Prime Leaders from Trendy Threats

    July 5, 2025
    Top Posts

    Alert: Uncovered JDWP Interfaces Result in Crypto Mining, Hpingbot Targets SSH for DDoS

    July 6, 2025

    How AI is Redrawing the World’s Electrical energy Maps: Insights from the IEA Report

    April 18, 2025

    Evaluating the Finest AI Video Mills for Social Media

    April 18, 2025

    Utilizing AI To Repair The Innovation Drawback: The Three Step Resolution

    April 18, 2025
    Don't Miss

    Alert: Uncovered JDWP Interfaces Result in Crypto Mining, Hpingbot Targets SSH for DDoS

    By Declan MurphyJuly 6, 2025

    Menace actors are weaponizing uncovered Java Debug Wire Protocol (JDWP) interfaces to acquire code execution…

    As we speak’s NYT Mini Crossword Solutions for July 6

    July 6, 2025

    A Mild Introduction to Principal Element Evaluation (PCA) in Python

    July 6, 2025

    Apache APISIX Vulnerability Permits Cross-Issuer Entry Underneath Misconfigurations

    July 6, 2025
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    UK Tech Insider
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms Of Service
    • Our Authors
    © 2025 UK Tech Insider. All rights reserved by UK Tech Insider.

    Type above and press Enter to search. Press Esc to cancel.